Search This Blog

Tuesday, August 02, 2005

An IM exchange that could be actionable

NETWORK WORLD NEWSLETTER: MICHAEL OSTERMAN ON MESSAGING
08/02/05
Today's focus: An IM exchange that could be actionable

Dear security.world@gmail.com,

In this issue:

* An example of why employers need to manage IM use
* Links related to Messaging
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Avocent
Network World Executive Guide: Security Evolves. Automation,
specialized 'ops centers' and more.

For network security professionals, keeping a safe distance
ahead of the worst the bad guys have to offer is a never-ending
race. This guide is designed to help with a collection of news,
analysis and product test reviews for practical how-to advice on
subjects ranging from patch management and spyware to promises
and risks of automated security services.
http://www.fattail.com/redir/redirect.asp?CID=109187
_______________________________________________________________
FREE NETWORK WORLD PRINT SUBSCRIPTIONS - SIGN UP NOW!

Security is one of the most pressing issues in all of IT, and
you need to stay on top of it. Network World delivers the
hottest security news. Network IT Executives depend upon Network
World for the information they need to keep their networks
secure! SUBSCRIBE TODAT AT:
http://www.fattail.com/redir/redirect.asp?CID=109078
_______________________________________________________________

Today's focus: An IM exchange that could be actionable

By Michael Osterman

IMbrella Software, which sells products to help organizations
manage the use of consumer instant-messaging clients in the
workplace, relates this short excerpt of an IM conversation that
one of IMbrella's customers provided. The exchange is a good
example of the basis for a potential sexual harassment claim -
one that could be brought simply by an employer failing to
properly manage employees' IM use.

Man: "Saw you come in this morning, you looked super hot."
Woman: "Yeap, I do that sometimes."
Man: "all the guys in engineering think you're the hottest chick
in the company."
Man: "there's a bet going on to see who can be the first to...
get your phone number."
Man: "I'm going to win!"
Man: "maybe we could have lunch sometime?"
Woman: "Sounds innocent enough."
Man: "are you innocent?"
Woman: "What do you think?"
Man: "maybe I could have you for dessert"
Woman: "I said lunch, I meant healthy, there was nothing about
dessert"
Man: "come on, I know you want me"
Woman: "That's irrelevant. We both have work to do. I have to
go."
Man: "wait..."
Woman: "done."
Man: "come on, dont be a tease"
Woman: "I said we are done here."
Man: "are you kidding, I see how you look at me"
Man: "lets talk about your outfit again, that's more fun"
Man: "how do you get into that thing, its so tight!"
Woman: "I think that's enough."
Man: "you're being a [expletive deleted]"

There have been numerous incidents in which employees have sued
their employer for promoting a hostile work environment. In some
cases, an employer can be found liable for doing nothing more
than providing the network facilities over which one employee
can sexually harass another. However, if an employer does
nothing to prevent such conduct, such as establishing policies
against it, deploying technology to prevent it and so forth,
there is little chance that the employer will be able to
appropriately defend itself in such a case.

The bottom line for any organization is to deploy technology
that will either block the type of communication shown above, or
that will allow managers to review content to look for
potentially damaging communications between employees. To do
nothing about this potential liability can cost an organization
dearly.

The top 5: Today's most-read stories

1. Cisco vulnerability posted to Internet
<http://www.networkworld.com/nlmsg4236>

2. Router flaw sparks battle
<http://www.networkworld.com/news/2005/080105-blackhat.html>

3. Researcher at center of Cisco router-exploit controversy
speaks out <http://www.networkworld.com/nlmsg4238>

4. Black Hat event highlights RFID and VoIP security threats
<http://www.networkworld.com/news/2005/080105-blackhat-side.html>

5. Cisco nixes conference session on hacking IOS router code
<http://www.networkworld.com/nlmsg4021>
_______________________________________________________________
To contact: Michael Osterman

Michael D. Osterman is the principal of Osterman Research
<http://www.ostermanresearch.com/>, a market research firm that
helps organizations understand the markets for messaging,
directory and related products and services. He can be reached
by clicking here <mailto:michael@ostermanresearch.com>
_______________________________________________________________
This newsletter is sponsored by Avocent
Network World Executive Guide: Security Evolves. Automation,
specialized 'ops centers' and more.

For network security professionals, keeping a safe distance
ahead of the worst the bad guys have to offer is a never-ending
race. This guide is designed to help with a collection of news,
analysis and product test reviews for practical how-to advice on
subjects ranging from patch management and spyware to promises
and risks of automated security services.
http://www.fattail.com/redir/redirect.asp?CID=109186
_______________________________________________________________
ARCHIVE LINKS

Archive of the Messaging newsletter:
http://www.networkworld.com/newsletters/gwm/index.html
_______________________________________________________________
FEATURED READER RESOURCE
SIX TIPS FOR GETTING WHAT YOU DESERVE

Before you go in for your next annual review or promotion
interview, you would be wise to consider these tips for ensuring
you've got the right stuff to move ahead. Network executives
offer advice to help you gun for that next promotion and fatten
up your paycheck. Click here:
<http://www.networkworld.com/you/2005/072505-salary-side2.html>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

No comments: